Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things

被引:12
作者
Cui, Qi [1 ,2 ,3 ]
Zhou, Zhili [1 ,2 ,3 ]
Fu, Zhangjie [1 ,2 ,3 ]
Meng, Ruohan [1 ,2 ,3 ]
Sun, Xingming [1 ,2 ,3 ]
Wu, Q. M. Jonathan [4 ]
机构
[1] Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Jiangsu, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[4] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
基金
中国国家自然科学基金;
关键词
Steganography; mobile edge computing; GAN; foreground object segmentation; STEGANALYSIS;
D O I
10.1109/ACCESS.2019.2913895
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing provides low-latency service computing for the Internet of Things (IoT). Considering the computational cost of high-quality image steganography in practical mobile applications, we believe that mobile edge computing could provide real-time service computing for covert communications. As a mainstream approach to convert communication, image steganographic algorithms prefer to hide secret data in well-textured regions in order to reduce the possibility of being detected. Recently, the generative adversarial networks (GAN) has become one of the most popular architectures for image steganography. However, the GAN-based image steganographic algorithms directly conduct the secret data embedding on the entire cover images and do not sufficiently take the regional texture complexity into account, which will compromise the anti-detection ability. To address this issue, we propose a novel image steganographic algorithm on the generated foreground object region with rich textures. More specifically, the foreground object region is generated onto a given cover image by the GAN, and the secret data is embedded in the foreground object region simultaneously during the generation of the region. The experimental results show that the proposed method can resist steganalysis effectively without significant degradation of image quality and achieve real-time processing.
引用
收藏
页码:90815 / 90824
页数:10
相关论文
共 39 条
[1]  
[Anonymous], 2017, ARXIV170107875
[2]  
[Anonymous], 2011, TECH REP CNS T 2011
[3]  
[Anonymous], PAC RIM C MULT
[4]  
[Anonymous], 2017, P ADV NEUR INF PROC
[5]  
[Anonymous], 2014, ARXIV PREPRINT ARXIV
[6]   Coverless Information Hiding Based on the Molecular Structure Images of Material [J].
Cao, Yi ;
Zhou, Zhili ;
Sun, Xingming ;
Gao, Chongzhi .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 54 (02) :197-207
[7]   JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images [J].
Chen, Mo ;
Sedighi, Vahid ;
Boroumand, Mehdi ;
Fridrich, Jessica .
IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2017, :75-84
[8]  
Cheung V., 2016, P NIPS, P2234
[9]   Composition-Driven IoT Service Provisioning in Distributed Edges [J].
Deng, Shuiguang ;
Xiang, Zhengzhe ;
Yin, Jianwei ;
Taheri, Javid ;
Zomaya, Albert Y. .
IEEE ACCESS, 2018, 6 :54258-54269
[10]   Coverless Steganography for Digital Images Based on a Generative Model [J].
Duan, Xintao ;
Song, Haoxian ;
Qin, Chuan ;
Khan, Muhammad Khurram .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (03) :483-493